25 Information Security Leaders to Follow on Twitter

A very interesting article by Ed Buzz from InformationSecurityBuzz.com:

You can take any industry in the world and you’ll find a community for it online. These communities are filled with characters and thinkers, jokers and talkers and folk who you’ll occasionally wish had never discovered Twitter.

So we at Information Security Buzz have compiled a list of the top 25 information security leaders you should be following on Twitter.

If you’re new to the industry and looking to find the superstars you should be following within the Twitter community; or just want to see how many of these you are already following, take a look below;

1. Paul Asadoorian – @pauldotcom

a1Some people prefer to absorb information audibly or visually. Luckily; for those in information security who like to learn that way, Paul Asadoorian provides podcasts and video blogs on all the latest from the world of infosec on his site, pauldotcom.com.

 

2. Gal Shpantzer – @Shpantzer

a2When you need a strong leader, someone to push through the complex business and technical problems, you should look to your Twitter feed and make sure Gal Shpantzer is on it!

 

3. Ron Gula – @RonGula

a3No artist can work without their instruments and the same is largely true for infosec folk. Turn to Ron Gula, the CEO of Tenable Network Security, he’ll have all the tools you’ll ever need.

 

4. Andrew Hay – @andrewsmhay

a4Do you know that man, the man that women want to be with and who men want to be? Well now you do, it’s Andrew Hay. He’s the devastatingly handsome Director of Applied Security @Cloudpassage. I look forward to your angry messages about how jealously has overcome you.

 

5. Jayson E. Street – @jaysonstreet

a5Do you like a bit of mystery on your Twitter feed? Well then you need Jayson E. Street. Scientists have long pondered as to why he only follows 403 people, but because of HTTP Error 403 they don’t have the authorisation to view this information.

Read the rest on their site here.

SANS Network Security 2013 is returning to the Caesars Palace campus on September 14 – 23

More than 45 hands-on courses are coming to Network Security 2013. New courses available at this year’s information security training event include the following:

·       SEC561: Hands-On Security Practitioner with NetWars – Joshua Wright
·       SEC573: Python for Penetration Testers – Mark Baggett
·       FOR526: Windows Memory Forensics In-Depth – Alissa Torres
·       SEC505: Securing Windows and Resisting Malware – Jason Fossen
·       AUD444: Auditing Security and Controls of Active Directory and Windows – Bryan Simon

For complete training details including info regarding all courses, with course overviews, instructor bios, and evening events included with training, please visit: http://www.sans.org/info/133332

***Register for any SANS Network Security 2013 course and save 5% using discount code SecOrb_05 ***

Games Giant Konami 35,000 Accounts Hacked, Change your Password

Another interesting article by our content partners at HackersNewsBullentin.com:

According to the notice by Konami on 9th July, they confirmed unauthorized login attempts to the KONAMI ID Portal site and after that they requesting users to change their passwords.

The firm, which makes notable games including Pro Evolution Soccer and Metal Gear Solid, said the unauthorised logins occurred on its Konami ID portal site between 13 June and 7 July. Konami IDs are used to manage logins for all online services provided by the company

Konami also warned 35,252 accounts holders personally to change their passwords because these 30,000+ accounts were seems to be compromised and the ids which were compromised are not accessible till they change their passwords.

According to KONAMI:

 

Read the rest on their site here.

From Now Obama gives himself total control of communication systems in America

An interesting article by HackersNewsBullentin.com about the Obama administration:

A secret move by President Barack Obama was reported by RT, according to the report Obama has signed an executive order giving the Department of Homeland Security the ability to shut down all of the United States’ communications systems upon his request.

All the power now in Obama’s hand, he can do anything when he wants as the way he like.

President Obama released his latest Executive Order on Friday, July 5 with a statement titled”Assignment of National Security Emergency Preparedness Communications Function”

Read the rest here.

Snowden says Israel, U.S. created Stuxnet virus that attacked Iran

Whistleblower Edward Snowden told a German magazine that Israel and the United States created the Stuxnet computer virus that destroyed nuclear centrifuges in Iran.

Snowden made the statement as part of an interview with the German news magazine Der Spiegel in which he answered encrypted questions sent by security software developer Jacob Appelbaum and documentary filmmaker Laura Poitras. Excerpts of the interview were published Monday on the Spiegel website.

Snowden was asked if the U.S. National Security Agency partners “with other nations, like Israel?” He responded that the NSA has a “massive body” responsible for such partnerships called the Foreign Affairs Directorate.

He also was asked,  “Did the NSA help to create Stuxnet?” Snowden responded, “NSA and Israel co-wrote it.”

Stuxnet in 2010 wrought havoc on equipment at Iran’s Natanz nuclear plant and complicated the manufacture of highly enriched uranium, which the West suspects is intended for making atomic weapons. The virus temporarily disabled 1,000 centrifuges being used by the Iranians to enrich uranium.

Snowden, a former technical contractor for the NSA and employee of the CIA, last month revealed the existence of mass surveillance programs by the United States and Britain against their own citizens and citizens of other countries.

Read the rest here.

DEF CON To Feds: We Need Some Time Apart – Krebs on Security

An interesting article from Brian Krebs of KrebsofSecurity.com:

One of the more time-honored traditions at DEF CON — the massive hacker convention held each year in Las Vegas — is “Spot-the-Fed,” a defconplayful and mostly harmless contest to out undercover government agents who attend the show.

But that game might be a bit tougher when the conference rolls around again next month: In an apparent reaction to recent revelations about far-reaching U.S. government surveillance programs, DEF CON organizers are asking feds to just stay away.

Read the rest on his site here.